Sciweavers

250 search results - page 31 / 50
» Lost source provenance
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
A novel approach using modulation features for multiphone-based speech recognition
Recent advances in coherent and convex demodulation have proven useful for analyzing and modifying the low-frequency envelope structure of speech. This paper reports the applicati...
Pascal Clark, Gregory Sell, Les E. Atlas
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CIKM
2006
Springer
13 years 11 months ago
Annotation propagation revisited for key preserving views
This paper revisits the analysis of annotation propagation from source databases to views defined in terms of conjunctive (SPJ) queries. Given a source database D, an SPJ query Q,...
Gao Cong, Wenfei Fan, Floris Geerts
POPL
2006
ACM
14 years 7 months ago
Stratified type inference for generalized algebraic data types
We offer a solution to the type inference problem for an extension of Hindley and Milner's type system with generalized algebraic data types. Our approach is in two strata. T...
François Pottier, Yann Régis-Gianas
ISLPED
2009
ACM
110views Hardware» more  ISLPED 2009»
14 years 2 months ago
End-to-end validation of architectural power models
While researchers have invested substantial effort to build architectural power models, validating such models has proven difficult at best. In this paper, we examine the accurac...
Madhu Saravana Sibi Govindan, Stephen W. Keckler, ...